Security Business

MAR 2014

Find news and information for the executive corporate security director, CSO, facility manager and assets protection manager on issues of policy, products, incidents, risk management, threat assessments and preparedness.

Issue link: https://sdi.epubxp.com/i/277471

Contents of this Issue

Navigation

Page 90 of 117

89 www.SecurityInfoWatch.com | SD&I | March 2014 #7 Grow your Twitter Tribe Continue working at building your Twitter followers. One of the keys to this is using the principle of reciprocation. Actively follow people and they will feel a certain obligation to follow you back. Just like email, you will have the equiva- lent of "un-subscribe" — it is called "un-follow." It happens all the time, so if you lose a few followers here and there, don't break into tears. Just continue to focus producing the best content you can for your followers. #8 Target your Audience I made a lot of mistakes along the way on Twitter, and one of them was following anyone who had a Twitter heartbeat — with many users who had nothing to do with my target market or topic. Using the Twitter tool Tweepi.com (paid ver- sion) I can follow followers of others in my niche(s). These are qualified groups of followers, and the principle of recip- rocation does the rest. Some follow you back! #9 @Mention Others The tactic of using @mentions when tweeting their content means they will notice you in their stream. I share about 25 bloggers content on a consistent basis and the @mention is always used when sharing their valuable content. This can lead to being able to connect and network. It is also an affir- mation that you appreciate the content. #10 Engage Engagement is a term that is frequently overused — often to its detriment on social media. What it really means is that you thank people (when you can), share their content, have conversations and in general just have personable fun. It will surprise you to where it will lead. One challenge you will find as you grow your follower network into the thousands is keeping up the personal engagement. #11 Persist Organic Twitter marketing success does not happen over- night. Sure, you can pay for Twitter advertising to acceler- ate the process, but earning your follower base rather than pulling out the credit card is one of the attractions of social media for me. So, persist with growing your followers, engaging with others and distributing their and your content on a consistent basis and the results will show up! ❚ Jeff Bullas is a blogger, author, strategist and speaker who works with companies to optimize online company presence and brand with digital and social media marketing. His book, Blogging the Smart Way, and his informative blog are available at www.jeffbullas.com. This is YOUR Central Station Our services are unique. Monitoring America is not for sale and will never be sold. We are a "Not for Proft" business. SERVICE. Not Proft is our Primary Goal. Work with a Partner not a Competitor. Call today and take advantage of our unique benefts. See us at ISC West 918-622-4357 • 800-879-1438 • Fax: 918-663-8897 3025 S. 116th Ave. • Tulsa, OK 74129-5223 www.monitoringamerica.com info@monitoringamerica.com Robust – equipment is built to withstand any environment Effortless Scalability – simple to complex systems Integrated – works with multiple systems and platforms Unlimited Networking - connectivity between any location Effcient - easy to install, confgure and manage remotely via the internet Safeguard your Facility with an IP Notifcation Solution Protect, Alert and Inform For more information about Exigo visit www.stentofon.com or call 800-654-3140. Exigo, the latest IP innovation in advanced Public Address and General Alarm systems from STENTOFON, is specifcally designed to meet today's demanding building security requirements. Request information: www.securityinfowatch.com/10490593 Request information: www.securityinfowatch.com/10546499 SDI_88-89_0314 Your Business Bullas.indd 89 3/5/14 1:46 PM

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Business - MAR 2014